IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Wireless Security

Wireless Security
View Sample PDF
Author(s): Erik Graham (General Dynamics Coorperation, USA)and Paul John Steinbart (Arizona State University, USA)
Copyright: 2006
Pages: 19
Source title: Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Source Author(s)/Editor(s): Merrill Warkentin (Mississippi State University, USA)and Rayford Vaughn (Mississippi State University, USA)
DOI: 10.4018/978-1-59140-911-3.ch015

Purchase

View Wireless Security on the publisher's website for pricing and purchasing information.

Abstract

The introduction of wireless networking provides many benefits, but it also creates new security threats and alters the organization’s overall information security risk profile. Although responding to wireless security threats and vulnerabilities often involves implementation of technological solutions, wireless security is primarily a management issue. Effective management of the threats associated with wireless technology requires a sound and thorough assessment of risk given the environment and development of a plan to mitigate identified threats. This chapter presents a framework to help managers understand and assess the various threats associated with the use of wireless technology. We also discuss a number of available measures for countering those threats.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom